Skip to main content

CVE-2022-49167: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49167cvecve-2022-49167
Published: Wed Feb 26 2025 (02/26/2025, 01:55:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: do not double complete bio on errors during compressed reads I hit some weird panics while fixing up the error handling from btrfs_lookup_bio_sums(). Turns out the compression path will complete the bio we use if we set up any of the compression bios and then return an error, and then btrfs_submit_data_bio() will also call bio_endio() on the bio. Fix this by making btrfs_submit_compressed_read() responsible for calling bio_endio() on the bio if there are any errors. Currently it was only doing it if we created the compression bios, otherwise it was depending on btrfs_submit_data_bio() to do the right thing. This creates the above problem, so fix up btrfs_submit_compressed_read() to always call bio_endio() in case of an error, and then simply return from btrfs_submit_data_bio() if we had to call btrfs_submit_compressed_read().

AI-Powered Analysis

AILast updated: 06/30/2025, 03:42:09 UTC

Technical Analysis

CVE-2022-49167 is a vulnerability identified in the Linux kernel's Btrfs (B-tree file system) implementation, specifically related to error handling during compressed read operations. The issue arises from improper management of bio (block I/O) completion calls when errors occur in the compression path. In the vulnerable code, if an error happens during a compressed read, the bio structure may be completed twice: once by the compression path and again by the btrfs_submit_data_bio() function. This double completion can lead to kernel panics or system instability. The root cause is that btrfs_submit_compressed_read() was only responsible for calling bio_endio() (which signals completion of a bio) if compression bios were created, otherwise it relied on btrfs_submit_data_bio() to handle it. The fix ensures that btrfs_submit_compressed_read() always calls bio_endio() on error and btrfs_submit_data_bio() returns early if btrfs_submit_compressed_read() handled the completion, preventing double completion. This vulnerability affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 and likely impacts systems using Btrfs with compression enabled. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns system stability and availability. Systems running Linux kernels with affected Btrfs versions and using compression features may experience kernel panics or crashes when encountering certain I/O error conditions, potentially leading to denial of service. This can disrupt critical services, especially in environments relying on Linux servers for storage, virtualization, or cloud infrastructure. Confidentiality and integrity impacts are minimal as the vulnerability does not directly enable unauthorized data access or modification. However, repeated crashes could cause data loss or corruption if not properly managed. Organizations with large-scale Linux deployments, particularly those using Btrfs for its advanced features like snapshots and compression, may face operational risks. The absence of known exploits reduces immediate threat but does not eliminate risk, especially as attackers could develop exploits targeting this flaw.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply the official Linux kernel patches that address CVE-2022-49167 as soon as they are available and tested in their environments. 2) If patching is delayed, consider disabling Btrfs compression temporarily to avoid triggering the vulnerable code path. 3) Monitor kernel logs for unusual bio completion errors or kernel panics related to Btrfs operations to detect potential exploitation or system instability. 4) Implement robust backup and recovery procedures to protect against data loss resulting from system crashes. 5) For critical systems, conduct thorough testing of kernel updates in staging environments to ensure stability before production deployment. 6) Maintain up-to-date inventory of Linux kernel versions and Btrfs usage across infrastructure to prioritize patching efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.278Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5117

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:42:09 AM

Last updated: 7/26/2025, 10:25:06 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats